Exam Questions with Correct
Solutions Updated
2025/2026||100% Guaranteed
Pass| A+ GRADED!!<<NEWEST
VERSION>>
Which of the following must you do when using an unclassified laptop in a
collateral classified environment?
-Use a wireless headset
-Disable the embedded camera, microphone, and Wi-Fi
-Use government-issued wired peripherals - ANSWER ✓ -Disable the embedded
camera, microphone, and Wi-Fi
-Use government-issued wired peripherals
*Physical Facilities
Sensitive Compartmented Information Facility (SCIF)
Which of the following must you do when working in a SCIF?
-Verify that all personnel in listening distance have a need-to-know
-Ensure that monitors do not provide unobstructed views
-Escort uncleared personnel and warn others in the SCIF - ANSWER ✓ -Verify
that all personnel in listening distance have a need-to-know
-Ensure that monitors do not provide unobstructed views
-Escort uncleared personnel and warn others in the SCIF
*Government Resources
Is this an appropriate use of government-furnished equipment (GFE)?
,-Yes
-No - ANSWER ✓ No
*Government Resources
This is not an appropriate use of GFE. Why?
-You should not use government e-mail to sell anything.
-You should use a digital signature when sending hyperlinks.
-You should not use unauthorized services, such as fileshare services, on GFE. -
ANSWER ✓ -You should not use government e-mail to sell anything.
-You should use a digital signature when sending hyperlinks.
-You should not use unauthorized services, such as fileshare services, on GFE.
*Identity Authentication
Alex
How do you secure your account?
I receive a text message code when logging in with a password.
-Yes
-Maybe
-No - ANSWER ✓ Yes
*Identity Authentication
Bailey
What kind of passwords do you use?
I use Password1 as one of my passwords.
-Yes
-Maybe
-No - ANSWER ✓ No
*Identity Authentication
,Charlie
How do you protect your Common Access Card (CAC) or personal Identity
Verification (PIV) Card?
I use my CAC occasionally as a secondary photo identification.
-Yes
-Maybe
-No - ANSWER ✓ Maybe
*Identity Authentication
Select the individual who securely authenticates their identity.
-Alex
-Bailey
-Charlie - ANSWER ✓ Alex
*Malicious Code
How can malicious code spread? Select all that apply. Then select submit.
-E-mail attachments
-Downloading files
-Visiting infected websites
-Virus scans - ANSWER ✓ -E-mail attachments
-Downloading files
-Visiting infected websites
*Malicious Code
How can you prevent the download of malicious code? Select all that apply. Then
select submit.
-Scan external files before uploading to your device
-Research apps and their vulnerabilities before downloading
-Use the Preview Pane to view e-mails
, -Disable automatic security patches - ANSWER ✓ -Scan external files before
uploading to your device
-Research apps and their vulnerabilities before downloading
*Malicious Code
Which of the following may indicate a malicious code attack? Select all that apply.
Then select submit.
-The device re-starts following a system update.
-A new app suddenly appears on the device.
-The device slows down.
-A new tab appears in the Web browser. - ANSWER ✓ -A new app suddenly
appears on the device.
-The device slows down.
-A new tab appears in the Web browser.
*Social Engineering
DoD IT. Alert: E-mail Storage Quota Exceeded
How many social engineering indicators are present in this e-mail?
-0
-1
-2
-3+ - ANSWER ✓ 3+
*Social Engineering
DoD Software. DoD Software share "Approved Software List" with you.
How many social engineering indicators are present in this e-mail?
-0
-1
-2
-3+ - ANSWER ✓ 3+